Skip to Main Content
Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
book

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals

by James C Foster
April 2005
Intermediate to advanced content levelIntermediate to advanced
700 pages
20h 39m
English
Syngress
Content preview from Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
Analysis
At lines 8 through 17, Win32-specific header files are included.The W32_fzs.h
header file is borrowed from the WinPcap source code and is used to properly
parse the interface names before displaying them on the Win32 platform.
At line 43, the get_adap() function is defined.This function takes a single
integer argument that is the index to the list of network interfaces available on
the local system.The value returned is name of the network interface at the
supplied index or NULL of the index is not valid.
At line 64, the list_adaps() function is defined.This function takes no arguments
and is used only to print a readable list of the network interfaces available on
the local system.This function will typically be called to display a list of net- ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

32/64-Bit 80x86 Assembly Language Architecture

32/64-Bit 80x86 Assembly Language Architecture

James Leiterman

Publisher Resources

ISBN: 9781597490054